Tuesday

26th Sep 2023

EU names China and Russia as top hackers

  • China was 'the top attacking country' on denial of service attacks (Photo: SimonQ)

Beware of opening emails entitled 'Official Data Breach Notification' or 'UPS Label Delivery' if you are a CEO, the EU's cyber-defence agency, Enisa, warned on Monday (15 January).

Those subject headings were the most popular sent in fake or 'phishing' emails that installed malware on victims' computers in 2017, along with 'IT Reminder: Your Password Expires', 'Please Read Important from Human Resources', and 'All Employees: Update your Healthcare Info'.

Read and decide

Join EUobserver today

Become an expert on Europe

Get instant access to all articles — and 20 years of archives. 14-day free trial.

... or subscribe as a group

  • Russian cyber espionage groups targeted Norwegian and Dutch ministries (Photo: Kelly)

The Greece-based EU agency noted in its annual report that cyber criminals out to steal money were the main "threat agent" who were "responsible for at least two-thirds of the incidents registered".

It said phishing "was reportedly responsible for 90 to 95 percent of successful attacks worldwide" and that the most sophisticated attacks were aimed at CEOs of large companies.

"Insiders" - personnel inside companies or government agencies who stole data - were the second biggest threat agent.

But Enisa noted that nation states were also out to steal information or to blackmail victims, using cyber-espionage, ransomware, malware, botnets, and other tricks.

"Nation states have become the third most active threat agent group with over 20 percent of incidents," it said, adding that "Given the advanced capabilities of this group, performed attacks are often difficult to identify and defend. This means that it is very likely that the actual activity of this group may be much higher".

It named China and Russia several times in its study.

China, India, and Russia were the three most "botnet infected countries", it said, referring to automated internet accounts used to send out spam, malware, denial of service attacks, and other malicious tricks.

The EU report said China was "the top attacking country" on denial of service attacks, which paralyse target systems by flooding them with data. It said 60 percent of all such attacks came from "China's army of hackers" and that 90 percent of them targeted US entities.

Attackers could hire botnet hordes on some Chinese sites "that even include dashboards showing the number of attacks carried out and the number of online bots" available the report said.

They could also rent "exploit kits", software designed to find security loopholes in users' systems, for up to $2,000 a month, on underground websites that offered online "support to both Russian and English speaking clients".

The EU report named three Chinese and Russian cyber-espionage groups - APT17389, APT28387, and APT29388 - as being among the most active and dangerous last year.

It said the China-based APT17389 group conducted "network intrusions against US government entities, the defence industry, law firms, information technology companies, mining companies, and non-government organisations".

It noted that APT28387, "a cyber-espionage group most probably sponsored by the Russian government" had tried to steal VIP guests' data in "hotels in at least seven European countries" in 2017.

The APT29388 group, "a Russian hacker group believed to be associated with Russian intelligence", had targeted Dutch and Norwegian government ministries.

"Understanding the key cybersecurity threats that the EU must respond to and the way in which they are evolving is essential if we are to successfully protect the cyberspace, the key enabler of the EU digital single market," Mariya Gabriel, the EU commissioner for the digital economy, said.

In other trends, Enisa noted that Mac users were increasingly coming under attack.

"Mac users were kept busy dealing with more malware in the second quarter [of 2017] than they had seen in all of 2016," it said.

The report noted the scale of the problem by citing one botnet network on Twitter, the US social media giant, that operated 350,000 fake accounts.

It also noted that individual companies held vast oceans of personal data that could be compromised in single attacks.

An attack on DU Group, a US web application company, last year got access to two billion "user phone numbers, names, and addresses" it said.

NetEase, a Chinese internet firm, let slip 1.2 billion email addresses and passwords that were later sold to other hackers on the web, while River City Media, a US online marketing company, lost 1.4 billion "names, addresses, IP addresses, and email addresses, as well as an undisclosed number of financial documents, chat logs, and backups", Enisa said.

Interview

EU 'underestimated' cyber-crime

"Cybercrime is growing much, much faster than I think we anticipated," the EU commissioner for security, Julian King, told EUobserver.

Investigation

Spy-air? EU warned on VIP jet leasing

Flying EU and Nato VIPs on part-Chinese jets could be a security risk, some have warned, but that was just a "James Bond" fantasy, the jet company said.

Europol busts global cybercrime gang

A loose network of cyber criminals recruited from an online Russian forum managed to infect thousands of computers in an effort to steal online banking credentials. The gang has been dismantled, with some now on the run.

Opinion

Orbán's 'revenge law' is an Orwellian crackdown on education

On Tuesday, the Hungarian parliament passed a troubling piece of legislation known by its critics as the 'revenge law', which aims to punish and intimidate teachers who dare to defy Viktor Orbán's regime. This law is a brutally oppressive tool.

Latest News

  1. EU warns of Russian 'mass manipulation' as elections loom
  2. Blocking minority of EU states risks derailing asylum overhaul
  3. Will Poles vote for the end of democracy?
  4. IEA says: Go green now, save €11 trillion later
  5. The failure of the Just Energy Transition Fund in South Africa
  6. EU and G7 tankers facilitating Russian oil exports, report finds
  7. EU trade chief in Beijing warns China of only 'two paths' forward
  8. Why should taxpayers pay for private fishing fleets in third countries?

Stakeholders' Highlights

  1. International Medical Devices Regulators Forum (IMDRF)Join regulators, industry & healthcare experts at the 24th IMDRF session, September 25-26, Berlin. Register by 20 Sept to join in person or online.
  2. UNOPSUNOPS begins works under EU-funded project to repair schools in Ukraine
  3. Georgia Ministry of Foreign AffairsGeorgia effectively prevents sanctions evasion against Russia – confirm EU, UK, USA
  4. International Medical Devices Regulators Forum (IMDRF)Join regulators & industry experts at the 24th IMDRF session- Berlin September 25-26. Register early for discounted hotel rates
  5. Nordic Council of MinistersGlobal interest in the new Nordic Nutrition Recommendations – here are the speakers for the launch
  6. Nordic Council of Ministers20 June: Launch of the new Nordic Nutrition Recommendations

Stakeholders' Highlights

  1. International Sustainable Finance CentreJoin CEE Sustainable Finance Summit, 15 – 19 May 2023, high-level event for finance & business
  2. ICLEISeven actionable measures to make food procurement in Europe more sustainable
  3. World BankWorld Bank Report Highlights Role of Human Development for a Successful Green Transition in Europe
  4. Nordic Council of MinistersNordic summit to step up the fight against food loss and waste
  5. Nordic Council of MinistersThink-tank: Strengthen co-operation around tech giants’ influence in the Nordics
  6. EFBWWEFBWW calls for the EC to stop exploitation in subcontracting chains

Join EUobserver

Support quality EU news

Join us